team.salesteamlink.com
Open in
urlscan Pro
34.202.35.242
Malicious Activity!
Public Scan
Submitted URL: https://team.salesteamlink.com/2f0fb356ebf1e7c7?l=72
Effective URL: https://team.salesteamlink.com/load_training?guid=250fb35f1bf1e7e4&correlation_id=26296c34-2770-438b-85d0-60d5fe6c8f7a
Submission: On December 07 via manual from US — Scanned from DE
Effective URL: https://team.salesteamlink.com/load_training?guid=250fb35f1bf1e7e4&correlation_id=26296c34-2770-438b-85d0-60d5fe6c8f7a
Submission: On December 07 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://team.salesteamlink.com/training/acceptance?correlation_id=26296c34-2770-438b-85d0-60d5fe6c8f7a
<form action="https://team.salesteamlink.com/training/acceptance?correlation_id=26296c34-2770-438b-85d0-60d5fe6c8f7a" id="training-form" method="post">
<div style="text-align: center; margin-top: 20px;"><input class="myButton" data-text="acknowledge" type="submit" value="Got it! Thanks!"></div>
</form>
Text Content
This is a simulation sent from Baylor College of Medicine The purpose of this simulation is to train users on how to recognize and respond to suspicious phising emails. Data that was entered has NOT been recorded or stored, your safety is our primary concern! In order to keep the integrity of this test, please do not inform your colleagues about this Phishing Campaign. Please watch for the additional training that will be assigned to you via the Learning Management System (LMS) in SuccessFactors This type of phish is known as a Credential Harvesting Attack. The hacker created a fake invitation and tricked you into providing credential information for use in a future attack. Here are some things to watch out for: Always check for grammatical and spelling errors. Most legitimate sites do not have multiple typos or broken sentence structure. Be cautious of clicking on links from unknown senders or from unexpected sources. Only enter sensitive information, such as passwords or banking information, on sites you know and trust. Always check the sender of the email. This email attempts to use a familar experience to gets you to act. It could be a potential scam, using a common experience as a to lull you into a false sense of security. Always verify the sender through a reputable source before responding, such as the Helpdesk or by using the "Report Phish" button in Outlook Examples from this Phish Email Callouts Login Site Callouts Please do not share your experience with colleagues, so they can learn too. Click the button below to acknowledge and close out of this message